net.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ea35bd175376d6f42163673ddaf73911_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea35bd175376d6f42163673ddaf73911_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea35bd175376d6f42163673ddaf73911_JaffaCakes118
-
Size
62KB
-
MD5
ea35bd175376d6f42163673ddaf73911
-
SHA1
82cc56fa71dfd6c8e3eef44604a180a60832da2b
-
SHA256
e48e96ec8984bef93ec476d42bdd87da5883b3eb7cf281ffdb8e76e4911f7010
-
SHA512
50bb1c02ccaec2951ae31b24bcb56764a4eb6adaa9e1108bd7604fb1c884c46baedd1d7d7400c61e4a7620c32d1bc75cca027815a8e20e946523bbe2ab37aff0
-
SSDEEP
1536:nmyAXivhJyLHSXuyTBN2Hf6zpc5mY8ft2Rz8+JE4D:npDJSyeyT6HaOHmgB854
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ea35bd175376d6f42163673ddaf73911_JaffaCakes118
Files
-
ea35bd175376d6f42163673ddaf73911_JaffaCakes118.exe windows:6 windows x86 arch:x86
b1f584304d1c7f2899a954905d8318c7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
kernel32
SetThreadUILanguage
GetCPInfo
GetConsoleOutputCP
GetLastError
HeapSetInformation
GetExitCodeProcess
WaitForSingleObject
CloseHandle
CreateProcessW
GetSystemDirectoryW
GetDriveTypeW
DelayLoadFailureHook
GetProcAddress
FreeLibrary
InterlockedCompareExchange
GetStdHandle
WriteFile
FormatMessageW
LocalFree
SetLastError
GetModuleFileNameW
PeekConsoleInputW
GetConsoleMode
SetConsoleMode
ReadConsoleW
GetFileType
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
Sleep
InterlockedExchange
GetCommandLineW
LoadLibraryExA
WriteConsoleW
LoadLibraryW
GetConsoleScreenBufferInfo
LocalAlloc
WideCharToMultiByte
msvcrt
_vsnwprintf_s
free
putchar
__setusermatherr
_amsg_exit
_initterm
__p__commode
_snwprintf_s
_local_unwind4
wcstok
_wcsdup
wcsncat_s
calloc
wcscspn
wcsspn
__set_app_type
__p__fmode
_except_handler4_common
?terminate@@YAXXZ
memmove
_XcptFilter
_exit
_cexit
__getmainargs
wcsrchr
wcsncpy_s
wcsncmp
qsort
_ultow
wcspbrk
iswctype
_wcsupr
_wcsicmp
wcschr
wcscpy_s
wcscat_s
exit
sprintf_s
setlocale
_wcsnicmp
memset
_iob
_fileno
_setmode
_controlfp
malloc
netutils
NetpwNameValidate
NetApiBufferReallocate
NetApiBufferAllocate
NetapipBufferAllocate
NetpwPathType
NetApiBufferFree
browcli
NetServerEnum
samcli
NetUserGetInfo
srvcli
NetShareEnum
NetServerGetInfo
wkscli
NetUseGetInfo
NetWkstaUserGetInfo
NetWkstaGetInfo
NetUseEnum
mpr
WNetEnumResourceW
WNetAddConnection2W
WNetCancelConnection2W
WNetGetLastErrorW
WNetGetConnectionW
WNetOpenEnumW
WNetCloseEnum
iphlpapi
GetCurrentThreadCompartmentId
ntdll
RtlAllocateHeap
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ